![]() |
| 2008 | ||
|---|---|---|
| 19 | EE | Zuhua Shao: Fair exchange protocol of signatures based on aggregate signatures. Computer Communications 31(10): 1961-1969 (2008) |
| 18 | EE | Zuhua Shao: Certificate-based fair exchange protocol of signatures from pairings. Computer Networks 52(16): 3075-3084 (2008) |
| 17 | EE | Zuhua Shao: Certificate-based verifiably encrypted signatures from pairings. Inf. Sci. 178(10): 2360-2373 (2008) |
| 2007 | ||
| 16 | EE | Zuhua Shao: On the Sequentiality of Three Optimal Structured Multisignature Schemes. ISPEC 2007: 105-115 |
| 15 | EE | Zuhua Shao: Self-certified Signatures Based on Discrete Logarithms. WAIFI 2007: 252-263 |
| 14 | EE | Zuhua Shao: A provably secure short signature scheme based on discrete logarithms. Inf. Sci. 177(23): 5432-5440 (2007) |
| 13 | EE | Zuhua Shao: Self-certified signature scheme from pairings. Journal of Systems and Software 80(3): 388-395 (2007) |
| 2006 | ||
| 12 | EE | Zuhua Shao: Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys. Informatica, Lith. Acad. Sci. 17(4): 577-586 (2006) |
| 11 | EE | Zuhua Shao: Security of the design of time-stamped signatures. J. Comput. Syst. Sci. 72(4): 690-705 (2006) |
| 2005 | ||
| 10 | EE | Zuhua Shao: Enhanced Aggregate Signatures from Pairings. CISC 2005: 140-149 |
| 9 | EE | Zuhua Shao: Short Signature Scheme Based on Discrete Logarithms. WAIM 2005: 645-650 |
| 8 | EE | Zuhua Shao: A new key authentication scheme for cryptosystems based on discrete logarithms. Applied Mathematics and Computation 167(1): 143-152 (2005) |
| 7 | EE | Zuhua Shao: Improvement of efficient proxy signature schemes using self-certified public keys. Applied Mathematics and Computation 168(1): 222-234 (2005) |
| 6 | EE | Zuhua Shao: Security of meta-He digital signature scheme based on factoring and discrete logarithms. Applied Mathematics and Computation 170(2): 976-984 (2005) |
| 5 | EE | Zuhua Shao: Cryptanalysis of Xia-You group signature scheme. Journal of Systems and Software 75(1-2): 89-94 (2005) |
| 2004 | ||
| 4 | EE | Zuhua Shao: Improvement of digital signature with message recovery using self-certified public keys and its variants. Applied Mathematics and Computation 159(2): 391-399 (2004) |
| 2003 | ||
| 3 | EE | Zuhua Shao: Proxy signature schemes based on factoring. Inf. Process. Lett. 85(3): 137-143 (2003) |
| 2 | EE | Zuhua Shao: Cryptanalysis of "an identity-based society oriented signature scheme with anonymous signers". Inf. Process. Lett. 86(6): 295-298 (2003) |
| 2001 | ||
| 1 | EE | Zuhua Shao: Batch verifying multiple DSA-type digital signatures. Computer Networks 37(3/4): 383-389 (2001) |